Appsian Blog Center

These Resources Will Help You Navigate The Challenges Of ERP Threats

Categories:
Filter By Year:
December 23, 2021
Remote Access Security: How to Replicate the 9 to 5 Workday

Over the last two years, organizations had to move employees out of a secure office environment and provide them with…...

Learn More
December 22, 2021
[Customer Story] How Appsian Helped The State of Kansas Secure Sensitive PeopleSoft Data With Dynamic Data Masking Tools

Like most state governments, the State of Kansas (the State) wanted employees and non-employees to access PeopleSoft self-service within and…...

Learn More
November 24, 2021
How Step-Up Authentication Protects Access to Sensitive Data

Protecting and maintaining the integrity of data, especially sensitive data, is one of the core objectives of any security strategy.…...

Learn More
October 27, 2021
How Identity Governance and Administration (IGA) Compliments IAM to Improve Data Security

Identity, Governance, and Administration (IGA) is defined by Gartner as an “activity within the identity and access management function that concerns the governance…...

Learn More
September 30, 2021
[Video Interview] David Vincent Talks to Security Guy TV About Improvements in ERP Security, Risk, and Compliance

Appsian Security’s Vice President of Product Strategy and Customer Experience, David Vincent, recently appeared on Security Guy TV to talk…...

Learn More
September 29, 2021
6 Warning Signs Of Potential Insider Threat Activity And How To Detect Them

Data breaches caused by ransomware attacks, phishing scams, and state-sponsored hacker groups tend to grab the headlines. However, the reality…...

Learn More
September 24, 2021
Preventing Risk from Privileged User Accounts: SAP, Oracle EBS & PeopleSoft

Organizations that use ERP applications like SAP, PeopleSoft, Oracle EBS, etc., manage thousands of users. Most of these users have…...

Learn More
September 23, 2021
How Enhanced Logging Enables Better Breach Investigation, Remediation, and Security

Every time a major data breach makes the headlines, the company in question almost always struggles to answer the most…...

Learn More
September 9, 2021
Unpacking China’s New Data Security Law and Privacy Legal Framework

If you’re a multinational enterprise (MNE) that does business in or with China, you’re likely aware of the Data Security…...

Learn More
August 13, 2021
How to Protect Your ERP With an Adaptive Security Model

Agility is the name of the game in today’s ERP data security landscape. Organizations are being challenged to detect threats as they…...

Learn More
August 11, 2021
SAP Data Security Best Practices for ITAR Compliance

You know how vital SAP data security can be in the age of data privacy and compliance regulations such as…...

Learn More
August 10, 2021
Managing Third-Party Risks with Continuous Controls Monitoring

Third-Party Risk Management (TRPM) is the process of analyzing and controlling risks presented to your company, your operations, your data,…...

Learn More
May 17, 2021
Zero Trust is a Centerpiece of President Biden’s Latest Executive Order on Cybersecurity

On May 12th, President Biden signed an Executive Order to help improve the nation’s cybersecurity posture and strengthen Federal networks.…...

Learn More
May 5, 2021
Uniting Appsian & Xpandion (GRC): Thoughts from Xpandion CEO, Moshe Panzer

Taken from Moshe Panzer's May 4th blog post on xpandion.com: For 14 years, Xpandion has been on a mission: to…...

Learn More
April 7, 2021
Are ERP Security and Compliance Risks Interfering with Your Digital Transformation?

Implementing enterprise resource planning (ERP) systems has always been both mission-critical and notoriously difficult. They must align with business processes,…...

Learn More
March 30, 2021
Key Strategies for Improving ERP Data Privacy and Compliance

With 2020 nearly three months behind us and the rollout of COVID-19 vaccines picking up speed, organizations are looking hopefully…...

Learn More
March 24, 2021
How Appsian Reduces Risk in SAP Procurement Transactions

The sheer breadth and complexity of the procurement process can make maintaining effective internal controls difficult. Organizations must implement business…...

Learn More
March 11, 2021
It’s Time to Include Data in the ERP Security Conversation

ERP security had traditionally focused on vulnerability testing for ERP applications, whether hosted on-premise or in the cloud. Given the…...

Learn More
February 26, 2021
How Remote Work Has Accelerated ERP Data Privacy Challenges

If 2020 was the year of hastily enabling secure remote access to ERP applications, then 2021 will be the year…...

Learn More
February 2, 2021
[Podcast] Potential ERP Data Security and Compliance Risks for Legacy Applications

Appsian's Executive Director for Security Solutions, Greg Wendt, appears in the latest episode of Brilliance Security Magazine Podcast. The focus of the conversation…...

Learn More
December 9, 2020
5 Types of Insider Threats and How to Detect Them in Your ERP System

While the majority of data breaches are from insider threats—a startling 57% according to the Verizon Insider Threat Report—many organizations overlook these internal dangers. Whether careless or malicious, employee, partner,…...

Learn More
December 8, 2020
Securing Business Data in ERP Applications: A Fast Path Guide to Success

With 2020 coming to a close, ensuring business applications are equipped to meet the longterm access demands of 2021 is…...

Learn More
November 20, 2020
Why the California Privacy Rights Act (CPRA) Presents Challenges for Legacy ERP Customers

While nearly everyone was focusing on the results of the 2020 Presidential race, California voters passed Proposition 24, the California…...

Learn More
November 16, 2020
How to Detect Insider Threats in Your ERP System

Insider Threats Are Becoming More Frequent and More Costly to Organizations. Especially Those Using Legacy ERP Systems. Here's How You…...

Learn More
November 6, 2020
Using Advanced Analytics to Improve ERP System Performance

Improve ERP System Performance with Real-Time Data Access & Usage Visibility   Your ERP system is a complex ecosystem with multiple deployments, serving hundreds to…...

Learn More
November 4, 2020
How IT Can Use ERP Data to Become a Hero to their Business Stakeholders

When business stakeholders come to you looking for answers, having visibility and context around ERP data access and usage gives…...

Learn More
October 29, 2020
Are Advanced Persistent Threats (APT) Haunting Your ERP Applications?

Halloween 2020 (the day, not another movie) is right around the corner. Usually, I'm thinking about spirits and haunted houses…...

Learn More
October 27, 2020
Data Breaches Are Going Up, While Cybersecurity Training is… Going Down?

According to a recent Shred-It survey, both senior leaders and employees indicated data breaches doubling in frequency in the last…...

Learn More
August 11, 2020
Monitoring High Privileged User Activity in PeopleSoft and SAP Using Appsian360

We are in the midst of a perfect storm of ERP security calamity: the greatest work from home experiment colliding with historic…...

Learn More
August 6, 2020
Protecting ERP Data from Application Vulnerabilities Using A Multi-Layered Security Approach

You spend countless hours, not to mention considerable money, to secure your SAP and Oracle ERP data. One day, you discover that cybercriminals…...

Learn More
July 28, 2020
When it Comes to ERP Data Security, Context (of Access) Matters – Appsian360 Can Help!

Organizations using traditional, on-premise ERP applications like SAP ECC and Oracle PeopleSoft are facing a rapidly changing reality around the…...

Learn More
June 24, 2020
CCPA Enforcement Is on Track to Start July 1, 2020. Are Your Data Privacy Strategies Ready?

Time is almost up for companies scrambling to get their data privacy strategies in compliance with the California Consumer Protection Act (CCPA). Beginning as…...

Learn More
June 1, 2020
Your Network Access Could Be for Sale on the Dark Web. Why ABAC is Critical for ERP Data when Your Network is Vulnerable

Thanks to TV commercials for identity protection services, you're forgiven for thinking that that dark web is primarily a place where criminals…...

Learn More
May 26, 2020
Does ERP Data Security Qualify as an Essential IT Project? Here Are Five Reasons Why It Does.

Stop me if you've heard (or spoken) this phrase: "All non-essential projects have been put on hold." To be fair,…...

Learn More
May 18, 2020
Access Governance is Critical for Preventing Phishing Attacks

The news is flooded with stories about cybercriminals successfully engaging in phishing and social engineering aimed at exploiting people’s COVID-19…...

Learn More
May 15, 2020
Why the Keys to Maintaining ERP Data Security in a Remote Environment are Control and Visibility

Remote workforces are nothing new to most organizations. According to Buffer’s 2019 State of Remote Work report, 44% of respondents…...

Learn More
May 14, 2020
Managing Compliance Costs with Enhanced Cybersecurity Visibility

Data privacy regulations are rapidly reshaping the way companies monitor, manage, and even define the data they collect and store.…...

Learn More
May 12, 2020
ERP User Activity Monitoring: Here are the (5) Most Important Details to Capture

Analytics have always been necessary for informing ERP data security policies. This has never been more relevant than today, in this…...

Learn More
May 7, 2020
Happy World Password Day! Celebrate By Adopting Passwordless Authentication (for PeopleSoft)

Every first Thursday in May, cybersecurity professionals collectively roll their eyes at the idea that there is (in fact), a…...

Learn More
April 22, 2020
Why VPN is Not Enough – and why Investing in ERP Data Security is Critical

With remote workplaces being put to the test, organizations are looking to quickly scale their security practices. Unfortunately, many are…...

Learn More
April 17, 2020
User Behavior Analytics are Critical in Remote ERP Environments. Here’s Why…

I was recently speaking with a customer who expressed a common concern. Because of COVID-19, their entire finance team was…...

Learn More
April 2, 2020
Is a VPN Enough to Maintain ERP Data Security?

With the influx of remote access demands, VPN vendors are no doubt having their moment. This is 100% warranted, but…...

Learn More
March 30, 2020
Protecting Remote Users From the Latest Barrage of Social Engineering Attacks

The rapid acceleration from on-location to remote workforce as part of the Coronavirus Pandemic response opened the door to malicious…...

Learn More
March 24, 2020
Remote Access: You Can’t Fight the Trend

In September of 2001, I was conducting a comprehensive security audit of a major health care insurer. They were dealing…...

Learn More
March 20, 2020
Five Tips to Make You a Work-From-Home Pro

The streets are empty, offices are closed, and your favorite bar around the corner is shut down until... well, we…...

Learn More
March 16, 2020
Maintaining Business Continuity During Coronavirus (COVID-19): Securing Critical ERP Functions For Remote Access

As organizations prepare to protect their workforce from Coronavirus (COVID-19), they need to balance best health practices with best security…...

Learn More
December 19, 2019
2020’s Top ERP Security Challenges: It’s All About the Data!

As we enter the new year, the criticality of securing sensitive data will continue to mold and transform the structure…...

Learn More
October 24, 2019
California Consumer Protection Act (CCPA) – Do You Have an Action Plan for your ERP?

CCPA – A Quick Review CCPA takes effect on January 1,2020. The spirit of CCPA revolves around consumers taking back…...

Learn More
October 15, 2019
64% of SAP & Oracle ERP Customers have reported a Breach (in last 24 months)

The numbers are out, and it's more apparent than ever - your ERP system is most likely at risk. A…...

Learn More
October 11, 2019
Why Contextual Access Controls are Essential for On-Premise ERP Applications

Gartner describes context-aware security as the use of supplemental information to improve security decisions at the time they are made. "Context" meaning…...

Learn More
September 26, 2019
Zero Trust Security: What it is and Where to Begin

What is Zero Trust Security? Zero Trust security is based on the principle of ‘never trust, always verify’. First introduced…...

Learn More
August 20, 2019
How to Make ERP Compliance Audits Cheaper and Faster

Organizations are facing growing challenges in order to meet the data privacy compliance requirements associated with mandates like The General…...

Learn More
August 8, 2019
BYOD & Allowing Mobile ERP Access: Evaluating Potential Risks

Organizations are rapidly shifting to workplaces without boundaries - teams are globally dispersed and companies are adopting work-from-home and BYOD…...

Learn More
August 5, 2019
Data Security Penalties Get Real….Real Expensive

How companies approach data security controls is changing. Segregation of Access (SoAx) is now just as critical as Segregation of…...

Learn More
June 20, 2019
Data Security: What Steps Can You Take?

We’ve talked extensively about Segregation of Access (SoAx) and how data security threats have evolved to include a range of…...

Learn More
April 19, 2019
Sensitive Data Security: It’s All About the Logging

Well, in today’s post it is all about the logging.  In a future post it will be all about the…...

Learn More
April 12, 2019
ERP Data Security Assessments: Then and Now

This is a long one and gets techie in areas, but bear with me.  There’s a moral to the story.…...

Learn More
March 18, 2019
How Establishing Strong Segregation of Access Policies are the Keys to Protecting your ERP Applications from Access via the Wild West (aka the internet)

In the years I’ve been architecting and assessing organizational information security approaches; the typical focus of any effort was on…...

Learn More
February 25, 2019
Privacy Versus Security in a Connected World

There’s an interesting story from a few years ago.  An angry father marched into the corporate office of Target and…...

Learn More
February 5, 2019
CISO Survival 103: The Importance of Classifying Sensitive ERP Data

This will be the final entry in our current CISO Survival series.  And we’re taking a step back.  We’ve talked…...

Learn More
February 1, 2019
CISO Survival Part 2: The Perils of Managing Sensitive Data

In our previous post, we talked about the role of the CISO and how the rapidly evolving, connected economy is…...

Learn More
January 30, 2019
CISO Survival: Are You Protecting Your Sensitive Data?

Do You Even Know What and Where It Is? Not too long ago, I was involved in the war room…...

Learn More
January 22, 2019
According to the OWASP, ERP Is Vulnerable

Representatives of the Open Web Application Security Project (OWASP) periodically release a top 10 list of known vulnerabilities that impact…...

Learn More
January 10, 2019
Locking the Front Door Isn’t Always Enough

Most of us are now familiar with what Multi Factor Authentication (MFA) has brought to our daily lives. Try accessing…...

Learn More
January 2, 2019
2019: ERP In the Crosshairs

There’s an old Hollywood saying that showcases the cinematic battle between the well-armed and the ill-prepared: “Never bring a knife…...

Learn More
December 5, 2018
ERP Breaches Increasingly Becoming User-Centric

According to a report from the Information Commissioner (ICO), data breaches are up 75% in two years. Research from the…...

Learn More
December 3, 2018
The Marriott Breach: Do You Have Unwanted Guests In Your ERP System?

Marriott has reported that a massive data breach of its guest reservation system has led to the exposure of over…...

Learn More
November 8, 2018
ERP Data Breaches: The Penalties Are Real… Real Expensive

The 2015 Anthem Medical Data Breach In August of this year, the United States approved the final judgement against the…...

Learn More
November 2, 2018
Social Engineering: Defending the Weakest Link

In today’s information security environment, great technological strides have been made in the areas of network protection, data encryption, intrusion…...

Learn More
September 11, 2018
Appsian Name Change FAQ

Can’t find your answer? Email us at info@appsian.com Why are you changing your brand? We are rebranding in order to position our organization…...

Learn More
July 23, 2018
California Raisin’ the Bar on Data Privacy

June was an interesting legislative month in the state of California.  In the face of an impending ballot initiative that…...

Learn More

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands